Abstract | ||
---|---|---|
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies the data in the hypervisor that controls whether a VM is privileged or not and thus can escalate the privilege of an unprivileged domain (domU) at run time. As ROP technique makes use of existed code to implement attack, not modifying or injecting any code, it can bypass the integrity protections that base on code measurement. By constructing such kind of attack at the virtualization layer, it can motivate further research work towards preventing or detecting ROP attack on the hypervisor. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/ARES.2012.16 | ARES |
Keywords | Field | DocType |
hypervisor,return-oriented programming,security,xen hypervisor,domu,virtualization layer,virtual machines,research work towardspreventing,rop technique,integrity protections,code measurement,return-oriented programming attack,unprivileged domain,integrity protection,rop attack,privilege escalation,vm,rop,data integrity,security of data | Virtual machine,Storage hypervisor,Privilege escalation,Computer security,Computer science,Hypervisor,Data integrity,Return-oriented programming,Operating system,Embedded system | Conference |
ISBN | Citations | PageRank |
978-1-4673-2244-7 | 4 | 0.42 |
References | Authors | |
0 | 6 |